- 专利标题: DECEIVING ATTACKERS ACCESSING NETWORK DATA
-
申请号: US18637358申请日: 2024-04-16
-
公开(公告)号: US20240356971A1公开(公告)日: 2024-10-24
- 发明人: Venu Vissamsetty , Anil Gupta , Harinath Vishwanath Ramchetty
- 申请人: Sentinelone, Inc.
- 申请人地址: US CA Mountain View
- 专利权人: Sentinelone, Inc.
- 当前专利权人: Sentinelone, Inc.
- 当前专利权人地址: US CA Mountain View
- 主分类号: H04L9/40
- IPC分类号: H04L9/40 ; G06F21/55 ; G06F21/56 ; H04L41/12 ; H04L61/4505 ; H04L61/4523 ; H04L61/5007
摘要:
Endpoints in a network execute a sensor module that intercepts commands. The sensor module compares a source of commands to a sanctioned list of applications received from a management server. If the source does not match a sanctioned application and the command is a write or delete command, the command is ignored and a simulated acknowledgment is sent. If the command is a read command, deception data is returned instead. In some embodiments, certain data is protected such that commands will be ignored or modified to refer to deception data where the source is not a sanctioned application. The source may be verified to be a sanctioned application by evaluating a certificate, hash, or path of the source. Responses from an active directory server may be intercepted and modified to reference a decoy server when not addressed to a sanctioned application. Requests to view network resources may be responded to with references to a decoy server.
信息查询